New & Notable
Manage
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
Manage
Taking care of business: The CISO's role in a cyber crisis
CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both technical and business outcomes.
Manage
What CISOs need to know about AI audit logs
AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to mitigate risks.
Get Started
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
Trending Topics
-
Data Security & Privacy Manage
Data after the breach: Economics of the dark web
A breach is just the beginning. Once extracted, data moves through a sophisticated supply chain. Peek inside the dark web economy that turns stolen credentials into billions of dollars in profit.
-
Threats & Vulnerabilities News
News brief: Security worries and warnings as AI use expands
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
IAM Manage
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
-
Analytics & Automation Evaluate
What every CISO should consider before a SIEM migration
Before starting a SIEM migration, the security team must identify the data, rules, workflows and policies they need to transition to the new tool or service. Here's how to get started.
-
Network Security Evaluate
The enterprise case for zero trust
When applied correctly, zero trust can minimize an organization's attack surface. Experts weigh in on the best use cases where zero trust can deliver results.
-
Operations & Management Manage
Taking care of business: The CISO's role in a cyber crisis
CISOs have a broad range of responsibilities. But when a crisis occurs, they become the de facto leader, entrusted with both technical and business outcomes.
Sponsored Sites
-
IT Workflows
Transform Your Organization With Modern and Resilient IT Services
Learn how ServiceNow’s IT solutions can help your organization seize the upside of operational resilience and raise employee agility.
-
Articlficial Intelligence
AI-Powered Devices: The Fourth Wave of Enterprise Computing
Enterprise computing enters its fourth wave as client devices transform from passive endpoints to intelligent AI systems. Modern laptops, desktops, and mobile devices now feature built-in NPUs and AI accelerators that bring artificial intelligence directly to where work happens. This shift creates distributed intelligence networks where every device anticipates user needs, optimizes workflows, and collaborates autonomously. Organizations gain enterprise AI at scale, transforming employees into human AI agents with unprecedented access to contextual, personalized computing experiences. The future of work is here—powered by intelligent devices that don't just access AI, but embody it.
-
Security
Leading the Way in Corrections Technology
From creating safer facilities to supporting stronger reentry outcomes, Aventiv, and its family of brands: Securus Technologies, Securus Monitoring and JPay, delivers technology solutions that safely and securely transform corrections environments for everyone.
Topics Covered
Application and platform security
Careers and certifications
Cloud security
Compliance
Data security and privacy
Identity and access management
Network security
Risk management
Security analytics and automation
Security operations and management
Threat detection and response
Threats and vulnerabilities
Find Solutions For Your Project
-
Evaluate
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
-
How to implement zero trust for AI
-
The breakup: Why CISOs are decoupling data from their SIEMs
-
How to construct an effective security controls evaluation
-
-
Problem Solve
Identity security for AI agents: The proliferation challenge
Identity teams can accelerate AI adoption with strong security foundations. But managing nondeterministic AI agents is different from securing human identities and traditional NHIs.
-
Taking care of business: The CISO's role in a cyber crisis
-
Transform SIEM rules with behavior-based threat detection
-
CISO's guide: How to test an incident response plan
-
-
Manage
What CISOs need to know about AI audit logs
AI audit logs are rapidly becoming essential tools for enterprise CISOs. Here's what cybersecurity leaders need to track to mitigate risks.
-
Claude Mythos changes the AI security threat matrix
-
What every CISO should consider before a SIEM migration
-
CISO's guide to centralized vs. federated security models
-
Information Security Basics
-
Get Started
SOC vs. MDR: What CISOs need to consider
Security operations centers and managed detection and response providers differ in how they manage threats. What's the best way to choose between a SOC and MDR service?
-
Get Started
CISO's guide: How to test an incident response plan
Creating an incident response plan is only the beginning. Regular testing will help ensure it doesn't fall apart during a real cybersecurity event.
-
Get Started
Buyer's guide for CISOs: Cloud security posture management
Cloud security posture management is a critical component of cloud defense strategy. Need help choosing a CSPM platform? This guide lists key features and platforms to consider.
Multimedia
-
News
View All -
Risk management
Instructure cyberattack reignites ransom payment debate
Instructure struck a deal to recover its stolen data -- likely paying a hefty ransom. For CISOs, deciding whether to negotiate with cybercriminals should come down to business risk.
-
Threats and vulnerabilities
News brief: Security worries and warnings as AI use expands
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
-
Threats and vulnerabilities
News brief: Critical infrastructure, OT cybersecurity attacks
Check out the latest security news from TechTarget SearchSecurity's sister sites, Cybersecurity Dive and Dark Reading.
Search Security Definitions
- What is identity and access management? Guide to IAM
- What is data masking?
- What is antivirus software?
- What is a stealth virus and how does it work?
- What is file integrity monitoring (FIM)?
- What is information security (infosec)?
- What is governance, risk and compliance (GRC)?
- What is integrated risk management (IRM)?






